Quote:
Originally Posted by CaptJamieHunter
I've mentioned before how as an IT professional I find it offensive and unacceptable that anything on my network's internal infrastructure should not be accessible to me to monitor, manage, report and audit. If I (and others who've commented on this aspect) are as aghast as we are then how the hell are ISPs falling for the "You can trust us" approach?.
|
Excuse me Mr. ISP. Can I put my box right in front of your pipe and you just give it all to me! i promise you'll have lots of money.
(Apologies for the crude euphemism but it just fits so well)
((Damn!

))
Quote:
Originally Posted by CaptJamieHunter
Everything on a network infrastructure has to have an audit trail or changelog of some description. It's basic management stuff. By allowing an alien presence on your network the ISP is leaving itself wide open to abuse by Phorm (or whoever the provider is) which it cannot track or do anything about.
|
I wouldn't allow it, if I was in charge of a major public network infrastructure. (any jobs going in that area yet?

)